نتایج جستجو برای: api approach

تعداد نتایج: 1301849  

2000
Donna Bergmark William Arms Carl Lagoze

The Digital Library Research Group at Cornell has Reference Linking as one of its projects. Typical projects within in the group take an object-oriented approach to handling digital information. To support reference linking, therefore, we designed a scheme whereby reference linking information is extracted from archives by surrogate objects and then presented to client applications or users by ...

2009
Thiago T. Bartolomei Krzysztof Czarnecki Ralf Lämmel Tijs van der Storm

API migration refers to adapting an application such that its dependence on a given API (the source API) is eliminated in favor of depending on an alternative API (the target API), where both APIs serve the same domain. One may attempt to automate API migration by code transformation or wrapping of some sort. API migration is relatively well understood for the special case where source and targ...

2014
Hiranya Jayathilaka Chandra Krintz Rich Wolski

Web services and cloud computing have revolutionized the way software is developed, deployed, and consumed. As a consequence, there has been a proliferation of web services, which developers make accessible to users via web application programming interfaces (web APIs) and cloud-based deployment technologies. Because this model significantly simplifies and expedites deployment of web APIs, it a...

2013
YOGESH PADMANABAN Vinod Ganapathy

Software developers often need to port applications written for a source platform to a target platform. One of the key tasks here is to find matching API calls in the target platform for the given API calls in the source platform. This task involves exhaustive reading in target platform API (Application Programming Interface) documentation to identify API methods corresponding to the given API ...

2014
Vlad Acretoaie Harald Störrle

Hypersonic is a Cloud-based tool that proposes a new approach to the deployment of model analysis facilities. It is implemented as a RESTful Web service API offering analysis features such as model clone detection. This approach allows the migration of resource intensive analysis algorithms from monolithic desktop modeling tools to a wide range of mobile and Web-based clients. As a technology d...

2010
Mathijs den Burger Ceriel J. H. Jacobs Thilo Kielmann André Merzky Ole Weidner Hartmut Kaiser

The abundance of middleware to access grids and clouds and their often complex APIs hinders ease of programming and portability. The Open Grid Forum (OGF) has therefore initiated the development and standardization of SAGA: a Simple API for Grid Applications. SAGA provides a simple yet powerful API with high-level constructs that abstract from the details of the underlying infrastructure. In th...

2005
Johannes Henkel Amer Diwan

Library developers who have to evolve a library to accommodate changing requirements often face a dilemma: Either they implement a clean, efficient solution but risk breaking client code, or they maintain compatibility with client code, but pay with increased design complexity and thus higher maintenance costs over time. We address this dilemma by presenting a lightweight approach for evolving ...

2002
Marco Castaldi Nathan D. Ryan

Component-based software, particularly distributed componentbased software, makes heavy use of interfaces to de ne the interactions among components. Each of these interfaces is usally presented in the form of an API, as a speci cation of the capabilities of the relevant component. However, while the predominant API model captures the behavior of individual interface members, it neglects the in...

Journal: :Computers & Security 2014
Ammar Ahmed E. Elhadi Mohd Aizaini Maarof Bazara I. A. Barry Hentabli Hamza

Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. API call graph techniques follow two main steps, namely, transformation of malware samples into an API call graph using API call graph constructio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید